Description
Pomelo v2.2.5 allows external control of critical state data. A malicious user input can corrupt arbitrary methods and attributes in template/game-server/app/servers/connector/handler/entryHandler.js because certain internal attributes can be overwritten via a conflicting name. Hence, a malicious attacker can manipulate internal attributes by adding additional attributes to user input.
Remediation
References
https://github.com/cl0udz/vulnerabilities/tree/master/pomelo-critical-state-manipulation
https://github.com/NetEase/pomelo/issues/1149
Related Vulnerabilities
CVE-2020-15242 Vulnerability in npm package next
CVE-2021-27516 Vulnerability in maven package org.webjars.npm:urijs
CVE-2023-44487 Vulnerability in maven package org.apache.tomcat.embed:tomcat-embed-core
CVE-2021-45457 Vulnerability in maven package org.apache.kylin:kylin-server
CVE-2020-13445 Vulnerability in maven package com.liferay:com.liferay.portal.template.freemarker